King Saud University

Displaying 1-40 of 55 results

In this paper, the authors present an IDentity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a...

There is no doubt that modern society depends heavily on information technology in nearly every facet of human activity. Organizations of all kinds are increasingly exposed to various kinds of risks, including information technology risks. There are many security standards and frameworks available to help organizations manage these risks. The...

Pervasive computing aims at creating environments saturated with embedded and portable computing devices surrounding the users and providing them with many interesting services. It has been gradually applied into the people everyday life and its applications are becoming more and more extensive day by day. However, exploiting its full potential...

The cloud computing is getting more and more important due to the large size of files that need to be shared and cannot be sent through the email. The need for cloud computing create a new challenges for security. In Cloud computing, there are three main parties: the server, the...

Wireless Sensor Networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. User authentication is necessary for legitimate access control in WSNs. Sensors have limited processing power, bandwidth, memory, and limited communication...

Wireless Sensor Networks (WSNs) are composed of sensor nodes and sinks. Sensor nodes have the capability of self-healing and self-organizing. Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. Their distributed nature, multi-hop data forwarding, and open wireless medium are the...

An ERP system is a system that needs to create integrated solutions in order to manage the bulk of operations inside a company or organization. Also ERP system is a critical and important investment that can affect the overall performance of a company. Open source ERP systems are often targeted...

From energy conservation perspective in Wireless Sensor Networks (WSNs), clustering of sensor nodes is a challenging task. Clustering technique in routing protocols play a key role to prolong the stability period and lifetime of the network. In this paper, the authors propose and evaluate a new routing protocol for WSNs....

Advancements in technologies, semiconductor industry and communications resulted in construction of wireless sensors. Wireless sensors are self-managing and sensing devices having the capability to communicate with each other and sink node wirelessly. The sink node can then take decision according to the application they are being used for; upon the...

Cloud computing finally emerged on the stage of the information technology. Virtualization is the core of cloud computing. Virtualization minimizes capital, operational and maintenance costs. Also, it provides flexibility in the used platform. However, the expansion of cloud computing is impeded by the lack of the security issue. Physical resources...

Time-cost-trade-off is a known method to accelerate a construction project by using the CPM method. However, this method cannot be used solely in the contractor or owner's decision to accelerate the project schedule because the vagueness of defining delays and acceleration responsibilities. In addition, time-cost-trade-off overlooks the increase in project...

In past three decades, the computing world is based on the Internet, featured by the rapid development and application of computer technology. The cloud computing model is one of the very important shapes of a new era. This technology based on the distributed computing, parallel computing, grid computing, Virtualization technologies,...

Continuity of services availability is critical in some business types such as banks, hospitals, and military institutions. However, this may be interrupted by either a natural disaster such as an earthquake, volcano, or a tornado. In addition, human negative interference such as hackers or terrorism may expose valuable resources to...

The rapid growth of electronic commerce and Internet-based applications demands strong privacy protection and robust system security, which are essential requirements for an authentication scheme or access control mechanism. The issue of remote user authentication has received much attention recently. Password authentication is one of the most convenient authentication mechanisms....

Bots are programs that crawl through the web site and make auto registrations. CAPTCHAs, using Latin script, are widely used to prevent automated bots from abusing online services on the World Wide Web. However, many of the existing English based CAPTCHAs have some inherent problems and cannot assure the security...

Now-a-days, Wireless Sensor Network (WSN) applications have been used in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. However, due to the limitations of WSNs in terms of memory, energy, computation, communication, and scalability, efficient management of the large number of WSNs data in...

Keyphrases, synonymously spoken as keywords, represent semantic meta-data and play an important role to capture the main theme represented by a large text data collection. Although authors provide a list of about five to ten keywords in scientific publications that are used to map them to respective domains, due to...

Social networking sites and applications are the major phenomenon all over the world and are constantly on a rise. As the users share their information and data on these sites, these sites can act as major source for misuse of information. So these SNS take steps stop this misuse of...

The Biometric Gaussian Stream (BGS) cryptosystem was extended by extensive research experimentation. Using this system, complexity is added to an image by passing it through a Gaussian noise function. This function is applied with specific parameters for the mean and variance, which also works as a parallel key. To implement...

Security requirements of a software product need to receive attention throughout its development lifecycle. This paper proposes the required notation and format to represent security requirements, especially access control policies in use case diagram and use case description. Such enhancements offer simple representation for positive and negative authorization, grouping sensitive...

Face recognition enhances the security through wireless sensor network and it is a challenging task due to constraints involved in wireless sensor network. Image processing and image communication in wireless sensor network reduce the life time of network due to the heavy processing and communication. Face recognition system enhances the...

With the advent and rising popularity of wireless systems, there is a proliferation of small-enabled devices such as PDAs, mobile phones, etc. While these devices are becoming more and more preferable by all age groups, they also pose the threat of being vulnerable to malicious code (e.g.: viruses, trojans, worms,...

Usability can be considered as an important requirement to provide high quality products. However, the usability testing has not been taken as basic task in the development life cycle which increases the number of products that have poor usability. The deficiency of excellent automated tools contributes mainly to this situation....

Advances in sensing and wireless communication technologies have enabled a wide spectrum of Outdoor Wireless Sensor Network (OWSN) applications. Some applications require the existence of a communication backbone federating different OWSN sectors, in order to collaborate in achieving more sophisticated missions. Federating (connecting) these sectors is an intricate task due...

Cloud computing provides a shared pool of computing resources that can be rapidly and elastically provisioned and released based on users' demand to serve a wide and constantly expanding range of information processing needs. Due to its tremendous advantages this technology is maturing rapidly and is being adopted in many...

One of the required standards of Healthcare Information Technology (HIT) and specially Electronic Health Records (HER) is to develop a Unique Patient Identifier (UPI) to enable physicians, hospitals, and other authorized users to share clinical and administrative records more efficiently. Till now there is no standard format of UPI which...

The primary and necessary task for any undergraduate student has to go through after his orientation is advising. Advising plays a key role in a student's success towards his degree program. Many reports were published recently on the survey of the declining college graduate students. There might be several reasons...

The recent advancement and development in Enterprise Resource Planning (ERP) Software Systems has been a major incident in the software industry in the last decades and their application is rising hastily in all industries. The recent research shows that the total revenue in the ERP software market is approaching to...

In 2008, Holbl et al. proposed improvements of Peyravian and Jeffries's DH (Diffie-Hellman)-based authentication protocol and password change protocol that can withstand the Shim's and Munilla et al.'s proposed off-line password guessing at-tacks. However, the authors found out that their protocols are still susceptible to off-line password guessing attacks and...

The Wireless Sensor Networks (WSN) are formed by a large number of sensor nodes working together to provide a specific duty. However, the low energy capacity assigned to each node prompts users to look at an important design challenge which is lifetime maximization. Therefore, designing effective techniques that conserve scarce...

The availability of massive amounts of experimental data based on genome-wide association and mass spectroscopy studies have given motivation in recent years to a large effort in developing mathematical, statistical and computational techniques to infer biological models from data. In many bioinformatics problems the number of features is significantly larger...

E-commerce is facing different challenges globally, and in particular, in developing countries. In some countries e-commerce adoption is slow because of some barriers; such as lack of trust. Customer trust is a significant issue in e-commerce since online services and products are typically not immediately verifiable. Both vendors and consumers...

The measurement of call quality from end users perspective is emerging area of research on speech quality in telecommunication networks. The research is focused on deriving the call quality parameters from end-users perspective and visualizes, escalate the critical call quality. Also, proses the method of redemption of call charges based...

Today information security is foremost demand of every application. Data confidentiality is really a challenging task for Wireless Sensor Networks (WSNs). A light weight and full proof security algorithm is introduced in this research paper. The authors have named it "Source ID Based Security (SIBS)" algorithm. SIBS algorithm involves the...

In this paper, methods to alleviate the problem of internal blocking in interconnection networks based on WDM are studied. In an ordinary 8x8 Omega network, only 10% of all permutations are permissible in one pass, and it gets worse with larger switches. However, using WDM technology, the performance of these...

This paper presents a new extended average magnitude difference function for noise robust pitch detection. Average magnitude difference function based algorithms are suitable for real time operations, but suffer from incorrect pitch detection in noisy conditions. The proposed new extended average magnitude difference function involves in sufficient number of averaging...

Increased generation of data in the e-governance R&D process is required to generate the expected services in terms of enhanced e-services productivity and pipelines. The inability of existing integration strategies to organise and apply the available knowledge to the range of real scientific, business and governance issues is impacting on...

Nowadays, there is a huge variety of cyber threats that can be quite dangerous not only for big companies but also for an ordinary user, who can be a potential victim for cybercriminals when using unsafe system for entering confidential data, such as login, password, credit card numbers, etc. Among...

The rapid growth of electronic commerce and Internet-based applications demands strong privacy protection and robust system security, which are essential requirements for an authentication scheme or access control mechanism. The issue of remote user authentication has received much attention recently. Password authentication is one of the most convenient authentication mechanisms....

Keyphrases, synonymously spoken as keywords, represent semantic meta-data and play an important role to capture the main theme represented by a large text data collection. Although authors provide a list of about five to ten keywords in scientific publications that are used to map them to respective domains, due to...

Face recognition enhances the security through wireless sensor network and it is a challenging task due to constraints involved in wireless sensor network. Image processing and image communication in wireless sensor network reduce the life time of network due to the heavy processing and communication. Face recognition system enhances the...

In 2008, Holbl et al. proposed improvements of Peyravian and Jeffries's DH (Diffie-Hellman)-based authentication protocol and password change protocol that can withstand the Shim's and Munilla et al.'s proposed off-line password guessing at-tacks. However, the authors found out that their protocols are still susceptible to off-line password guessing attacks and...

Time-cost-trade-off is a known method to accelerate a construction project by using the CPM method. However, this method cannot be used solely in the contractor or owner's decision to accelerate the project schedule because the vagueness of defining delays and acceleration responsibilities. In addition, time-cost-trade-off overlooks the increase in project...

Social networking sites and applications are the major phenomenon all over the world and are constantly on a rise. As the users share their information and data on these sites, these sites can act as major source for misuse of information. So these SNS take steps stop this misuse of...

Advancements in technologies, semiconductor industry and communications resulted in construction of wireless sensors. Wireless sensors are self-managing and sensing devices having the capability to communicate with each other and sink node wirelessly. The sink node can then take decision according to the application they are being used for; upon the...

From energy conservation perspective in Wireless Sensor Networks (WSNs), clustering of sensor nodes is a challenging task. Clustering technique in routing protocols play a key role to prolong the stability period and lifetime of the network. In this paper, the authors propose and evaluate a new routing protocol for WSNs....

Today information security is foremost demand of every application. Data confidentiality is really a challenging task for Wireless Sensor Networks (WSNs). A light weight and full proof security algorithm is introduced in this research paper. The authors have named it "Source ID Based Security (SIBS)" algorithm. SIBS algorithm involves the...

In this paper, methods to alleviate the problem of internal blocking in interconnection networks based on WDM are studied. In an ordinary 8x8 Omega network, only 10% of all permutations are permissible in one pass, and it gets worse with larger switches. However, using WDM technology, the performance of these...

E-commerce is facing different challenges globally, and in particular, in developing countries. In some countries e-commerce adoption is slow because of some barriers; such as lack of trust. Customer trust is a significant issue in e-commerce since online services and products are typically not immediately verifiable. Both vendors and consumers...

The availability of massive amounts of experimental data based on genome-wide association and mass spectroscopy studies have given motivation in recent years to a large effort in developing mathematical, statistical and computational techniques to infer biological models from data. In many bioinformatics problems the number of features is significantly larger...

One of the required standards of Healthcare Information Technology (HIT) and specially Electronic Health Records (HER) is to develop a Unique Patient Identifier (UPI) to enable physicians, hospitals, and other authorized users to share clinical and administrative records more efficiently. Till now there is no standard format of UPI which...

The primary and necessary task for any undergraduate student has to go through after his orientation is advising. Advising plays a key role in a student's success towards his degree program. Many reports were published recently on the survey of the declining college graduate students. There might be several reasons...

The planning and cost-modeling of large-scale computer Wide Area Networks (WANs) are important issues for carrier service providers, Internet Service Providers (ISP), and for large enterprises that use WANs. This paper develop several quantitative and business-oriented cost models that define the mathematical relationships needed to derive the cost estimate of...

Short Message Service (SMS) is provided by all cell phone operators and is extensively used by cell phone users. There is a wide range of applications demand in which a user interacts with a PC application via SMS message. This series of papers provides step by step tutorial for creating...

This research presents a modular software system that computes the mathematical relationships needed to evaluate planning and business-oriented models for estimation of the cost of a set of current Wide Area Networks (WAN) transmission technologies. Based on the software modular design, a program for constructing a minimum-cost WAN design is...

Increased generation of data in the e-governance R&D process is required to generate the expected services in terms of enhanced e-services productivity and pipelines. The inability of existing integration strategies to organise and apply the available knowledge to the range of real scientific, business and governance issues is impacting on...

Software development has emerged as a disciplined discipline and the use of process models to develop the software has increased over time. Although the software industry is blessed with quite a few tool driven approaches, and the usage of technology is increasing yet the amount of risks faced by the...

This is a proven fact in the modern medical sciences that all human bodies develop from a combination of stem cells, which matures to form a fetus and so on into a neonate. This procedure is natural, (Until and unless, under certain circumstances where it may not be able occur...

This paper presents a new extended average magnitude difference function for noise robust pitch detection. Average magnitude difference function based algorithms are suitable for real time operations, but suffer from incorrect pitch detection in noisy conditions. The proposed new extended average magnitude difference function involves in sufficient number of averaging...

Time warp is a well-known optimistic mechanism for parallel execution of simulation programs. Implementing time warp using a connection-oriented communication approach is proposed in the literature as a way to improve time warp performance because it allows for the use of more efficient event queue implementations. However, no empirical performance...

Nowadays, there is a huge variety of cyber threats that can be quite dangerous not only for big companies but also for an ordinary user, who can be a potential victim for cybercriminals when using unsafe system for entering confidential data, such as login, password, credit card numbers, etc. Among...

In this paper the authors report on an inexpensive device that helps a person with physical disability to interact with the Web. The human computer interface is made through a head tracking pointer. The head tracking pointer consists of the Wii controller (Wiimote), a low cost and readily available game...

Building a scalable Video On Demand (VOD) architecture is essential for the optimization of the VOD service cost and to support a very large VOD content library. The Peer-To-Peer (P2P) VOD architecture works towards achieving this goal, by distributing the video files to the user's set-top boxes at the network...

The measurement of call quality from end users perspective is emerging area of research on speech quality in telecommunication networks. The research is focused on deriving the call quality parameters from end-users perspective and visualizes, escalate the critical call quality. Also, proses the method of redemption of call charges based...

The Wireless Sensor Networks (WSN) are formed by a large number of sensor nodes working together to provide a specific duty. However, the low energy capacity assigned to each node prompts users to look at an important design challenge which is lifetime maximization. Therefore, designing effective techniques that conserve scarce...

Cloud computing provides a shared pool of computing resources that can be rapidly and elastically provisioned and released based on users' demand to serve a wide and constantly expanding range of information processing needs. Due to its tremendous advantages this technology is maturing rapidly and is being adopted in many...

Usability can be considered as an important requirement to provide high quality products. However, the usability testing has not been taken as basic task in the development life cycle which increases the number of products that have poor usability. The deficiency of excellent automated tools contributes mainly to this situation....

Advances in sensing and wireless communication technologies have enabled a wide spectrum of Outdoor Wireless Sensor Network (OWSN) applications. Some applications require the existence of a communication backbone federating different OWSN sectors, in order to collaborate in achieving more sophisticated missions. Federating (connecting) these sectors is an intricate task due...

This paper aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate...

The cloud computing is getting more and more important due to the large size of files that need to be shared and cannot be sent through the email. The need for cloud computing create a new challenges for security. In Cloud computing, there are three main parties: the server, the...

The purpose of this paper is to investigate the role and impact of Business Process Management (BPM) in successful Enterprises System (ES) software package implementation. A literature review was conducted to understand the critical success factors in successful ES implementation. This paper addresses the role and impact of BPM in...

As Enterprise Resource Planning (ERP) implementation has become more popular and suitable for every business organization, it has become an essential factor for the success of a business. This paper shows the best integration of ERP with Customer Relationship Management (CRM). Data Mining is overwhelming the integration in this model...

Now-a-days, businesses are emerged to be expanded. And business stakeholders from different industries compete to open new markets in new geographic areas, which indeed raise the necessity to have ubiquitous systems to follow and simplifying these expanded and inflated enterprise organizations. ERP systems are booming these days. But it suffers...

The recent advancement and development in Enterprise Resource Planning (ERP) Software Systems has been a major incident in the software industry in the last decades and their application is rising hastily in all industries. The recent research shows that the total revenue in the ERP software market is approaching to...

An ERP system is a system that needs to create integrated solutions in order to manage the bulk of operations inside a company or organization. Also ERP system is a critical and important investment that can affect the overall performance of a company. Open source ERP systems are often targeted...

Wireless Sensor Networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. User authentication is necessary for legitimate access control in WSNs. Sensors have limited processing power, bandwidth, memory, and limited communication...

Now-a-days, Wireless Sensor Network (WSN) applications have been used in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. However, due to the limitations of WSNs in terms of memory, energy, computation, communication, and scalability, efficient management of the large number of WSNs data in...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?